CN115134080B - Data transmission method and device based on security encryption chip - Google Patents

Data transmission method and device based on security encryption chip Download PDF

Info

Publication number
CN115134080B
CN115134080B CN202211023071.4A CN202211023071A CN115134080B CN 115134080 B CN115134080 B CN 115134080B CN 202211023071 A CN202211023071 A CN 202211023071A CN 115134080 B CN115134080 B CN 115134080B
Authority
CN
China
Prior art keywords
video stream
target video
filling
coding sequence
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202211023071.4A
Other languages
Chinese (zh)
Other versions
CN115134080A (en
Inventor
颜昕明
张海华
张子桓
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Wise Security Technology Co Ltd
Original Assignee
Guangzhou Wise Security Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Wise Security Technology Co Ltd filed Critical Guangzhou Wise Security Technology Co Ltd
Priority to CN202211023071.4A priority Critical patent/CN115134080B/en
Publication of CN115134080A publication Critical patent/CN115134080A/en
Application granted granted Critical
Publication of CN115134080B publication Critical patent/CN115134080B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • H04L9/0897Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage involving additional devices, e.g. trusted platform module [TPM], smartcard or USB
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Multimedia (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)

Abstract

The application discloses a data transmission method and device based on a security encryption chip. According to the technical scheme provided by the embodiment of the application, under the condition that the target video stream contains the specified human face features, the target video stream is processed by using the set messy code filling algorithm based on the first feature coding sequence of the specified human face feature conversion to obtain the encrypted video data packet, and the encrypted video data packet is sent to the corresponding request terminal; and then receiving face information input by a user through the request terminal, judging whether the face information is matched with the specified face characteristics, if so, converting the specified face characteristics into a second characteristic coding sequence, and decrypting the encrypted video data packet based on a messy code decryption algorithm corresponding to the messy code filling algorithm and the second characteristic coding sequence to obtain the target video stream. By adopting the technical means, the face characteristics of the user are combined with the messy code filling encryption, the cracking difficulty of the monitoring video stream can be increased, the safety of data transmission is improved, and the privacy of the user is prevented from being revealed.

Description

Data transmission method and device based on security encryption chip
Technical Field
The present application relates to the field of data processing technologies, and in particular, to a data transmission method and apparatus based on a secure cryptographic chip.
Background
At present, with the rapid development of monitoring systems, monitoring cameras are installed in areas which are visible everywhere in life, so that things happening in corresponding areas can be monitored in real time. For example, a user can install a monitoring camera in a private living area, the monitoring camera transmits collected videos to a mobile phone of the user, and the user can remotely control the private living area.
However, the conventional surveillance video transmission method generally adopts a simple encryption algorithm to encrypt video frames, and since privacy information of users may be involved in the video frames, the simple data encryption method is easy to crack the video frame data, which results in the video data being stolen. The security of video data transmission can not be guaranteed, and privacy of users is revealed.
Disclosure of Invention
The application provides a data transmission method and device based on a security encryption chip, which can increase the cracking difficulty of a monitoring video stream, improve the security of data transmission, avoid the disclosure of user privacy and solve the technical problem that the user privacy is revealed because the existing monitoring video stream is easily cracked.
In a first aspect, the present application provides a data transmission method based on a secure cryptographic chip, including:
extracting a target video stream by a monitoring terminal, identifying each video frame of the target video stream based on a face detection algorithm, and judging whether the target video stream contains specified face features, wherein the specified face features are configured to the monitoring terminal in advance by a request terminal;
under the condition that the target video stream is determined to contain the specified human face features, processing the target video stream by using a set messy code filling algorithm based on a first feature coding sequence converted from the specified human face features, combining the first feature coding sequence and the coding sequence of the target video stream through a coding filling rule of the messy code filling algorithm to obtain an encrypted video data packet, and sending the encrypted video data packet to the corresponding request end;
the request end receives face information input by a user, judges whether the face information is matched with the specified face features, if yes, the specified face features are converted into a second feature coding sequence, and the encrypted video data packet is decrypted based on a messy code decryption algorithm corresponding to the messy code filling algorithm and the second feature coding sequence to obtain the target video stream.
Further, the encoding filling rule is multiple, and the merging the first feature encoding sequence and the encoding sequence of the target video stream by the encoding filling rule of the scrambling filling algorithm includes:
selecting a target filling rule from a plurality of the coding filling rules, and merging the first characteristic coding sequence and the coding sequence of the target video stream based on the target filling rule; or,
merging the first feature encoding sequence and the encoding sequence of the target video stream using a plurality of the encoding stuffing rules.
Further, said merging the first feature encoding sequence and the encoding sequence of the target video stream using the plurality of encoding fill rules comprises:
configuring corresponding coding filling rules for the video frames corresponding to the time stamp sequence according to the time stamp sequence of each video frame in the target video stream;
and selecting a corresponding coding filling rule according to the time stamp sequence of the current video frame to combine the coding sequence of the current video frame and the first characteristic coding sequence.
Further, still include:
and the monitoring end periodically updates the coding filling rule, and after the coding filling rule is updated, an updating instruction is sent to the request end so that the request end updates the coding decryption rule of the messy code decryption algorithm according to the updating instruction.
Further, the recognizing each video frame of the target video stream based on the face detection algorithm, and determining whether the target video stream contains a designated face feature, includes:
inputting each video frame of the target video stream into a pre-constructed target detection model for detection, and judging whether the target video stream contains specified face features or not based on an output result of the target detection model, wherein the target detection model is trained and constructed in advance according to a training data set constructed by the specified face features.
Further, after determining that the target video stream contains the specified facial features, the method further includes:
and updating the target video stream to the training data set, and iteratively training the target detection model based on the updated training data set.
In a second aspect, the present application provides a data transmission apparatus based on a secure cryptographic chip, including:
the identification module is used for extracting a target video stream through a monitoring end, identifying each video frame of the target video stream based on a face detection algorithm, and judging whether the target video stream contains specified face features, wherein the specified face features are configured to the monitoring end in advance by a request end;
the encryption module is used for processing the target video stream by using a set messy code filling algorithm based on a first feature coding sequence converted by the specified human face features under the condition that the target video stream is determined to contain the specified human face features, combining the first feature coding sequence and the coding sequence of the target video stream according to a coding filling rule of the messy code filling algorithm to obtain an encrypted video data packet, and sending the encrypted video data packet to the corresponding request terminal;
and the decryption module is used for receiving face information input by a user through the request terminal, judging whether the face information is matched with the specified face characteristics, if so, converting the specified face characteristics into a second characteristic coding sequence, and decrypting the encrypted video data packet based on a messy code decryption algorithm corresponding to the messy code filling algorithm and the second characteristic coding sequence to obtain the target video stream.
Further, the number of the encoding filling rules is multiple, and the encryption module is specifically configured to:
selecting a target filling rule from a plurality of the coding filling rules, and merging the first characteristic coding sequence and the coding sequence of the target video stream based on the target filling rule; or,
merging the first feature encoding sequence and the encoding sequence of the target video stream using a plurality of the encoding stuffing rules.
In a third aspect, the present application provides an electronic device comprising:
a memory and one or more processors;
the memory for storing one or more programs;
when the one or more programs are executed by the one or more processors, the one or more processors are caused to implement the secure cryptographic chip-based data transmission method according to the first aspect.
In a fourth aspect, the present application provides a storage medium containing computer-executable instructions for performing the secure cryptographic chip-based data transmission method according to the first aspect when executed by a computer processor.
The method comprises the steps that a target video stream is extracted through a monitoring end, each video frame of the target video stream is identified based on a face detection algorithm, whether the target video stream contains designated face features or not is judged, and the designated face features are configured to the monitoring end in advance through a request end; under the condition that the target video stream contains the specified human face features, processing the target video stream by using a set messy code filling algorithm based on a first feature coding sequence of specified human face feature conversion, combining the first feature coding sequence and the coding sequence of the target video stream through a coding filling rule of the messy code filling algorithm to obtain an encrypted video data packet, and sending the encrypted video data packet to a corresponding request end; and then receiving face information input by a user through the request terminal, judging whether the face information is matched with the specified face characteristics, if so, converting the specified face characteristics into a second characteristic coding sequence, and decrypting the encrypted video data packet based on a messy code decryption algorithm corresponding to the messy code filling algorithm and the second characteristic coding sequence to obtain the target video stream. By adopting the technical means, the face characteristics of the user are combined with the messy code filling encryption, the cracking difficulty of the monitoring video stream can be increased, the safety of data transmission is improved, and the privacy of the user is prevented from being revealed.
Drawings
Fig. 1 is a flowchart of a data transmission method based on a secure cryptographic chip according to an embodiment of the present application;
fig. 2 is a flowchart of scrambling code stuffing encryption of a target video stream according to an embodiment of the present application;
fig. 3 is a schematic transmission diagram of an encrypted video data packet according to one embodiment of the present application;
FIG. 4 is a flowchart illustrating a process of a target video stream according to an embodiment of the present application;
fig. 5 is a schematic structural diagram of a data transmission apparatus based on a secure cryptographic chip according to a second embodiment of the present application;
fig. 6 is a schematic structural diagram of an electronic device according to a third embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, specific embodiments of the present application are described in detail below with reference to the accompanying drawings. It is to be understood that the specific embodiments described herein are merely illustrative of and not restrictive on the broad application. It should be further noted that, for the convenience of description, only some but not all of the relevant portions of the present application are shown in the drawings. Before discussing exemplary embodiments in more detail, it should be noted that some exemplary embodiments are described as processes or methods depicted as flowcharts. Although a flowchart may describe the operations (or steps) as a sequential process, many of the operations can be performed in parallel, concurrently or simultaneously. In addition, the order of the operations may be re-arranged. The process may be terminated when its operations are completed, but may have additional steps not included in the figure. The processes may correspond to methods, functions, procedures, subroutines, subprograms, and the like.
The first embodiment is as follows:
fig. 1 is a flowchart of a data transmission method based on a secure cryptographic chip according to an embodiment of the present disclosure, where the data transmission method based on the secure cryptographic chip provided in this embodiment may be executed by a data transmission device based on the secure cryptographic chip, the data transmission device based on the secure cryptographic chip may be implemented in a software and/or hardware manner, and the data transmission device based on the secure cryptographic chip may be formed by two or more physical entities or may be formed by one physical entity. Generally, the data transmission device based on the secure encryption chip can be a video monitoring system or the like.
The following description will be given taking the data transmission device based on the secure cryptographic chip as an example of a main body for executing the data transmission method based on the secure cryptographic chip. Referring to fig. 1, the data transmission method based on the secure cryptographic chip specifically includes:
s110, a monitoring end extracts a target video stream, identifies each video frame of the target video stream based on a face detection algorithm, and judges whether the target video stream contains designated face features, wherein the designated face features are configured to the monitoring end in advance by a request end.
The data transmission method based on the security encryption chip aims to detect and identify a surveillance video stream to be transmitted, judge whether the surveillance video stream to be transmitted contains privacy information of a user, and if so, encrypt the video stream by combining face features of the user with a messy code filling algorithm, so that a safer data encryption transmission mechanism is provided, the difficulty of breaking and stealing video data is increased, and the privacy security of the user is guaranteed. For the video stream without user privacy, a conventional video encryption transmission mechanism can be adopted, so that too much video encryption cost is avoided, the video stream transmission efficiency is ensured, and the security of video stream transmission is improved.
Exemplarily, in an actual target video streaming scenario, a target video stream refers to a video stream that a current monitoring end prepares to send to a mobile phone client of a user. For example, the monitoring camera collects a video stream and then sends the video stream to the processor, and the processor encrypts the video stream and then transmits the video stream to the mobile phone client of the user. And when the target video stream contains the specified face features, the face features of the user are combined with a messy code filling algorithm to encrypt the video stream, so that the security of transmitting the video stream to the user client is guaranteed, and the condition that the privacy of the user is leaked due to the fact that the video stream is easily cracked is avoided.
The specified face features are feature data which are configured to the monitoring terminal in advance by the request terminal (namely the user client) and contain face information of the user. When the monitoring system is built, a user builds an internet of things transmission link with the monitoring terminal through a client side such as a mobile phone. The face information of the user, family and the like is uploaded, and the face information is used as the designated face characteristics and configured to the monitoring end, so that the video stream can be encrypted and authenticated when a target video stream is subsequently requested from the monitoring end.
It can be understood that, for a target video stream containing specified human face features, since the target video stream relates to privacy information pictures of users and family members, in order to protect the privacy information of the users, the present embodiment improves the cracking difficulty of the target video stream by performing a relatively safer encryption transmission mechanism on the target video stream containing the privacy pictures, so as to improve the security of encryption transmission of the target video stream, and reduce the risk of user privacy disclosure.
Specifically, when identifying whether a target video stream contains specified face features, inputting each video frame of the target video stream into a pre-constructed target detection model for detection, and judging whether the target video stream contains the specified face features based on an output result of the target detection model, wherein the target detection model is trained and constructed in advance according to a training data set constructed by the specified face features.
The target detection model can adopt a neural network model such as a Yolov3 target detection model. In training the target detection model, a training data set is constructed by collecting image data containing specified facial features (i.e., user likeness). And further designing a neural network structure and a loss function of the target detection model, and training network parameters of the target detection model by using the training data set marked with the specified target. After the model training is finished, the model structure and the parameters are saved for subsequent specified target detection to determine specified human face characteristics.
The YOLOv3 target detection model mainly comprises a convolutional layer and a pooling layer, wherein the naming rule of the layers in the network comprises the categories and the numbers appearing in the network for the number of times, for example, conv8 represents the 8 th convolutional layer in the network, upsampling represents an upsampling layer in the network, the size of an output characteristic diagram of each layer in the network is represented as resolution width multiplied by resolution height multiplied by channel number, and through a plurality of layers of convolutional level pooling layers, a rectangular frame and a category of each target in an image are finally obtained to complete the detection of the target. The pooling layer is an image down-sampling operation, and although parameters of the convolution feature layer are reduced and the model operation speed is increased, semantic information loss is caused to the convolution feature map of the previous layer. The YOLOv3 target detection network considers the problem of computing resources, and the basic framework of the YOLOv3 target detection network in the embodiment of the application is tiny-dark net, the parameters of which are only 4M, and the size of the YOLOv3 target detection network is small and is suitable for landing.
Based on the detection result of the target detection model, whether the target video stream contains the specified human face features or not, namely whether the target video stream contains the specified user privacy information or not can be determined. And then according to the detection result, under the condition that the target video stream contains the specified human face characteristics, adaptively selecting a corresponding encryption mechanism to encrypt and transmit the monitoring video stream.
Based on a YOLOv3 target detection model, each video frame in the monitored video stream to be transmitted can be quickly detected, and whether the video frame contains the specified face features or not is determined. Compared with other target detection algorithms, the YOLOv3 target detection model is high in detection speed, and the scheme only needs to determine whether the video frame contains the specified face features or not, and does not need to determine the positions of the specified face features in the video frame, so that the specified face features in the video frame can be quickly detected through YOLO, the specified face features in the video stream can be quickly screened out, and the encryption processing efficiency of the target video stream is improved.
Optionally, in an embodiment, in a case that it is determined that the target video stream includes the specified facial features, the target video stream is also updated to the training data set, and the target detection model is iteratively trained based on the updated training data set.
It can be understood that, for the target video stream in which the designated face features are recognized, since the target video stream contains the designated face features, in order to enable the target detection model to recognize and detect the designated face features more accurately and quickly, the target video stream is added into the training data set to perform iterative training of the target detection model, so that the detection accuracy and efficiency of the target detection model can be further improved, and the encryption transmission efficiency of the monitoring video stream is optimized.
S120, under the condition that the target video stream is determined to contain the specified human face features, the target video stream is processed by using a set messy code filling algorithm based on a first feature coding sequence of the specified human face feature conversion, the first feature coding sequence and the coding sequence of the target video stream are combined through a coding filling rule of the messy code filling algorithm to obtain an encrypted video data packet, and the encrypted video data packet is sent to the corresponding request terminal.
Further, based on the target detection model, if the target video stream is determined to contain the specified human face features, the target video stream is encrypted by combining the specified human face features with a messy code filling algorithm. Because the target video stream is encrypted by using a simple encryption mode, once the key information is cracked, the data leakage situation occurs in the data transmission link, so that the data content is easily stolen, and the security of data transmission is influenced. Therefore, when the monitoring end sends the target video stream containing the user privacy information, the target video stream is subjected to scrambling code filling encryption at first, so that the transmission security of the target video stream is improved.
Specifically, the messy code filling algorithm is used for disturbing a coded character sequence of the target video stream, and the target video frame after the messy code processing can be checked through the corresponding messy code decryption algorithm, so that the cracking difficulty of the target video stream is improved, and the risk of leaking the privacy picture is reduced.
The messy code filling algorithm comprises filling character information and a coding filling rule, wherein the filling character information refers to character information filled into a coding sequence of a target video stream, and the coding filling rule refers to a rule for filling the filling character information into the video character information, such as character head-tail splicing, character cross filling and the like. For example, if the padding information is 100, the code sequence is 011, and the code padding rule is character end-to-end concatenation, the code sequence after scrambling is 100011. If the code filling rule is character cross filling, the code sequence after the scrambling code processing is 100101. The messy code decryption algorithm corresponding to the messy code filling algorithm can be correspondingly determined according to the filling character information and the coding filling rule. Therefore, when the mobile phone client of the user receives the encrypted video data packet after the scrambling code filling processing, the scrambling code decryption algorithm can be determined based on the filling character information and the coding filling rule, and the target video stream is obtained through the scrambling code decryption algorithm. It should be noted that the above padding character information and the encoding padding rule are only examples, and the present embodiment does not limit the specific padding character information and the encoding padding rule.
It will be appreciated that when the target video stream is encoded as a digital signal, it is transmitted as a series of binary coded sequences for each frame of video. Similarly, when the target video stream is encrypted, if the target video stream contains the specified human face features, the monitor end of the embodiment of the application converts the specified human face features obtained by pre-configuration into a binary sequence, defines the binary sequence as a first feature encoding sequence, then uses the first feature encoding sequence as filling character information, and uses a code filling rule of a messy code filling algorithm to perform messy code filling encryption on the target video stream.
It should be noted that, in an actual encryption scene, based on the first feature encoding sequence, the scrambling code padding encryption may be performed on each video frame of the target video stream according to the encoding padding rule. Or all characters of the first characteristic coding sequence can be averagely distributed to each video frame according to the character sequence, and then the messy code filling encryption is carried out according to the character sequence distributed by each video frame and the coding filling rule. The specific messy code filling encryption scheme is not fixedly limited in the embodiment of the application, and is not described herein in detail.
In an embodiment, the scrambling code padding algorithm is configured with a coding padding rule in advance, and the target video stream is encrypted by the coding padding rule to obtain an encrypted video data packet after scrambling code processing.
In another embodiment, the encoding padding rule is multiple, and the combining the first feature encoding sequence and the encoding sequence of the target video stream by the encoding padding rule of the scrambling code padding algorithm includes:
selecting a target filling rule from a plurality of the coding filling rules, and merging the first characteristic coding sequence and the coding sequence of the target video stream based on the target filling rule; alternatively, the first feature encoding sequence and the encoding sequence of the target video stream are combined using a plurality of the encoding stuffing rules.
In the case that the number of the encoding filling rules is multiple, one or more encoding filling rules can be selected from the multiple encoding filling rules to carry out the garbled filling encryption.
When one coding filling rule is selected for scrambling code filling encryption, the coding filling rule is defined as a target filling rule, and a target video stream is encrypted through the target filling rule to obtain an encrypted video data packet processed by scrambling codes.
When a plurality of coding filling rules are selected for random filling encryption, a rule list is constructed by the selected coding filling rules, and when a target video stream is encrypted, the rule list is traversed to obtain the coding filling rules to perform random filling encryption of the target video stream.
Specifically, referring to fig. 2, when a plurality of encoding and padding rules are selected for scrambling and padding encryption, the scrambling and padding encryption process of the target video stream includes:
s1201, configuring corresponding coding filling rules for the video frames corresponding to the time stamp sequence according to the time stamp sequence of each video frame in the target video stream;
and S1202, selecting a corresponding coding filling rule according to the time stamp sequence of the current video frame, and combining the coding sequence of the current video frame and the first characteristic coding sequence.
A list of rules for embodiments of the present application is provided, with reference to table 1 below.
TABLE 1
Serial number Character fill rules
Character end-to-end connection
Character cross merge
Referring to table 1, according to the multiple encoding padding rules, corresponding encoding padding rules are configured for video frames corresponding to the timestamp order according to the timestamp order of each video frame in the target video stream. For example, the first half of the video frames of the target video stream are connected end to end by using the filling rule "character end connection", and the second half of the video frames of the target video stream are combined by using the character filling rule "character cross. And performing messy code filling encryption on the video frames with different timestamp sequences respectively to obtain encrypted video data packets.
It should be noted that the above-mentioned encoding and padding rule is only an example of the embodiment of the present application, and in practical applications, various complex encoding and padding rules may be adaptively selected for video data encryption according to data encryption requirements. The specific coding filling rule is not subject to fixed limitation in the embodiments of the present application, and is not described herein again.
Optionally, in an embodiment, based on the selected plurality of encoding fill rules, when the target video stream is encrypted, the video stream may be encrypted in an iterative encryption manner. For the coding sequence of the target video and the first characteristic coding sequence, firstly, a first coding filling rule is used for carrying out messy code filling encryption to obtain encrypted data. And further performing messy code filling operation of the encrypted data by using a second code filling rule and combining the first characteristic coding sequence on the basis of the encrypted data. By analogy, iterative messy code filling encryption of encrypted data is carried out by using the first characteristic coding sequence and combining different coding filling rules, and a final encrypted video data packet is obtained. Through iterative messy code filling encryption, a safer and more complex data encryption scheme can be provided, and the video stream transmission security is improved.
In one embodiment, the monitoring end periodically updates the encoding filling rule, and after the encoding filling rule is updated, an updating instruction is sent to the request end so that the request end updates the encoding decryption rule of the scrambled code decryption algorithm according to the updating instruction.
By updating the code filling rule at regular time, the data cracking difficulty can be further increased. It will be appreciated that long term use of the same code filling rule increases the chance that the code filling rule is broken. Therefore, the difficulty of decoding the code filling rules is improved by periodically updating the code filling rules, so that the difficulty of stealing data is increased, and the safety of video data transmission is improved.
Specifically, the request end can be prompted to update the encoding and decryption rules of the garbled decryption algorithm according to the updated encoding and filling rules through the updating instruction. So that the messy code decryption algorithm of the request end and the messy code encryption algorithm of the monitoring end keep synchronous.
After the scrambling code filling encryption processing of the target video stream is completed, as shown in fig. 3, the monitoring end 11 sends the generated encrypted video data packet to the requesting end 12.
Optionally, for a target video stream that does not include the specified human face feature, since the requirement of protecting the privacy of the user by the part of the video stream is low, in order to reduce the video encryption cost and improve the video stream transmission efficiency, the target video stream may be encrypted by directly using the set encryption information to obtain an encrypted video data packet. According to whether the video content of the target video stream relates to the user privacy condition or not, different encryption transmission mechanisms are adaptively selected, so that the user privacy is not easily revealed, the security of the user privacy is improved, and the video encryption transmission efficiency and flexibility are improved.
S130, the request end receives face information input by a user, judges whether the face information is matched with the specified face features, if yes, the specified face features are converted into a second feature coding sequence, and the encrypted video data packet is decrypted based on a messy code decryption algorithm corresponding to the messy code filling algorithm and the second feature coding sequence, so that the target video stream is obtained.
Further, the encrypted video data packet is transmitted to the request end. For one end of the request end, in order to avoid irrelevant personnel from viewing the target video stream containing the user privacy information, the face information input by the current user is acquired in a face feature matching mode, the face information is matched with the pre-stored specified face features, and whether the current user has the viewing permission of the target video stream is authenticated. And under the condition that the current user is determined to have the viewing authority, decrypting the encrypted video data packet.
In practical application, a user uses a mobile phone and other clients to request a target video stream from a monitoring end, and after authentication is completed through face feature matching of the user, an encrypted video data packet sent by the monitoring end is received, and then the encrypted video data packet is decrypted and displayed to the current user.
When the encrypted video data packet is decrypted, the specified human face features are converted into digital signals of binary sequences, the digital signals are defined as a second feature coding sequence, and the encrypted video data packet can be decrypted based on the second feature coding sequence and a messy code decryption rule of a corresponding messy code decryption algorithm, so that a final target video stream is obtained.
As described above with reference to fig. 4, the target video stream is extracted by the monitoring terminal, each video frame of the target video stream is identified based on the face detection algorithm, whether the target video stream contains the specified face features is determined, and the specified face features are preconfigured to the monitoring terminal by the requesting terminal; under the condition that the target video stream contains the specified human face features, processing the target video stream by using a set messy code filling algorithm based on a first feature coding sequence of specified human face feature conversion, combining the first feature coding sequence and the coding sequence of the target video stream through a coding filling rule of the messy code filling algorithm to obtain an encrypted video data packet, and sending the encrypted video data packet to a corresponding request end; and then receiving face information input by a user through the request terminal, judging whether the face information is matched with the specified face characteristics, if so, converting the specified face characteristics into a second characteristic coding sequence, and decrypting the encrypted video data packet based on a messy code decryption algorithm corresponding to the messy code filling algorithm and the second characteristic coding sequence to obtain the target video stream. By adopting the technical means, the face characteristics of the user are combined with the messy code filling encryption, so that the cracking difficulty of the monitoring video stream can be increased, the safety of data transmission is improved, and the privacy of the user is prevented from being revealed. Moreover, for the video stream which does not contain the specified human face characteristics, the video stream can be encrypted by adopting normal encryption information. By adopting a conventional encryption transmission mode for the video stream which does not contain the user privacy information, the video encryption cost is not increased too much, and the security of video stream transmission is improved while the video stream transmission efficiency is ensured.
Example two:
on the basis of the foregoing embodiment, fig. 5 is a schematic structural diagram of a data transmission device based on a secure cryptographic chip according to a second embodiment of the present application. Referring to fig. 5, the data transmission apparatus based on a secure cryptographic chip provided in this embodiment specifically includes: an identification module 21, an encryption module 22 and a decryption module 23.
The identification module 21 is configured to extract a target video stream through a monitoring terminal, identify each video frame of the target video stream based on a face detection algorithm, and determine whether the target video stream contains an assigned face feature, where the assigned face feature is preconfigured to the monitoring terminal by a requesting terminal;
the encryption module 22 is configured to, when it is determined that the target video stream includes the specified human face feature, process the target video stream using a set scramble filling algorithm based on a first feature encoding sequence of the specified human face feature conversion, merge the first feature encoding sequence and the encoding sequence of the target video stream according to an encoding filling rule of the scramble filling algorithm to obtain an encrypted video data packet, and send the encrypted video data packet to the corresponding request terminal;
the decryption module 23 is configured to receive, through the request terminal, face information input by a user, determine whether the face information matches the specified face features, if so, convert the specified face features into a second feature encoding sequence, and decrypt the encrypted video data packet based on a scrambling code decryption algorithm corresponding to the scrambling code filling algorithm and the second feature encoding sequence, so as to obtain the target video stream.
Specifically, the number of the encoding filling rules is multiple, and the encryption module 22 is specifically configured to:
selecting a target filling rule from a plurality of the coding filling rules, and combining the first feature coding sequence and the coding sequence of the target video stream based on the target filling rule; or,
merging the first feature encoding sequence and the encoding sequence of the target video stream using a plurality of the encoding stuffing rules.
Specifically, the encryption module 22 configures corresponding encoding and filling rules for the video frames corresponding to the timestamp sequence according to the timestamp sequence of each video frame in the target video stream;
and selecting a corresponding coding filling rule according to the time stamp sequence of the current video frame to combine the coding sequence of the current video frame and the first characteristic coding sequence.
Specifically, the data transmission device based on the secure encryption chip further comprises:
and periodically updating the coding filling rule through the monitoring terminal, and after updating the coding filling rule, sending an updating instruction to the request terminal so that the request terminal updates the coding decryption rule of the messy code decryption algorithm according to the updating instruction.
Specifically, the recognition module 21 is configured to input each video frame of the target video stream into a pre-constructed target detection model for detection, and determine whether the target video stream contains an assigned face feature based on an output result of the target detection model, where the target detection model is trained and constructed in advance according to a training data set constructed by the assigned face feature.
Specifically, the recognition module 21 is further configured to update the specified face features to the training data set, and iteratively train the target detection model based on the updated training data set.
Extracting a target video stream through the monitoring terminal, identifying each video frame of the target video stream based on a face detection algorithm, and judging whether the target video stream contains specified face features, wherein the specified face features are configured to the monitoring terminal in advance by the request terminal; under the condition that the target video stream contains the specified human face features, processing the target video stream by using a set messy code filling algorithm based on a first feature coding sequence of specified human face feature conversion, combining the first feature coding sequence and the coding sequence of the target video stream through a coding filling rule of the messy code filling algorithm to obtain an encrypted video data packet, and sending the encrypted video data packet to a corresponding request end; and then receiving face information input by a user through the request terminal, judging whether the face information is matched with the specified face characteristics, if so, converting the specified face characteristics into a second characteristic coding sequence, and decrypting the encrypted video data packet based on a messy code decryption algorithm corresponding to the messy code filling algorithm and the second characteristic coding sequence to obtain the target video stream. By adopting the technical means, the face characteristics of the user are combined with the messy code filling encryption, the cracking difficulty of the monitoring video stream can be increased, the safety of data transmission is improved, and the privacy of the user is prevented from being revealed.
The data transmission device based on the secure encryption chip provided by the second embodiment of the present application can be used for executing the data transmission method based on the secure encryption chip provided by the first embodiment of the present application, and has corresponding functions and beneficial effects.
Example three:
an embodiment of the present application provides an electronic device, and with reference to fig. 6, the electronic device includes: a processor 31, a memory 32, a communication module 33, an input device 34, and an output device 35. The number of processors in the electronic device may be one or more, and the number of memories in the electronic device may be one or more. The processor, memory, communication module, input device, and output device of the electronic device may be connected by a bus or other means.
The memory 32 is a computer-readable storage medium, and can be used for storing software programs, computer-executable programs, and modules, such as program instructions/modules corresponding to the data transmission method based on the secure cryptographic chip according to any embodiment of the present application (for example, the identification module, the encryption module, and the decryption module in the data transmission apparatus based on the secure cryptographic chip). The memory can mainly comprise a program storage area and a data storage area, wherein the program storage area can store an operating system and an application program required by at least one function; the storage data area may store data created according to use of the device, and the like. Further, the memory may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other non-volatile solid state storage device. In some examples, the memory may further include memory remotely located from the processor, which may be connected to the device through a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The communication module 33 is used for data transmission.
The processor 31 executes various functional applications and data processing of the device by running software programs, instructions and modules stored in the memory, that is, implements the above-described data transmission method based on the secure cryptographic chip.
The input device 34 may be used to receive entered numeric or character information and to generate key signal inputs relating to user settings and function controls of the apparatus. The output device 35 may include a display device such as a display screen.
The electronic device provided by the above can be used to execute the data transmission method based on the secure encryption chip provided by the first embodiment, and has corresponding functions and beneficial effects.
Example four:
embodiments of the present application further provide a storage medium containing computer-executable instructions, which when executed by a computer processor, are configured to perform a secure cryptographic chip-based data transmission method, where the secure cryptographic chip-based data transmission method includes: extracting a target video stream by a monitoring terminal, identifying each video frame of the target video stream based on a face detection algorithm, and judging whether the target video stream contains specified face features, wherein the specified face features are configured to the monitoring terminal in advance by a request terminal; under the condition that the target video stream is determined to contain the specified human face features, processing the target video stream by using a set messy code filling algorithm based on a first feature coding sequence converted from the specified human face features, combining the first feature coding sequence and the coding sequence of the target video stream through a coding filling rule of the messy code filling algorithm to obtain an encrypted video data packet, and sending the encrypted video data packet to the corresponding request terminal; the request end receives face information input by a user, judges whether the face information is matched with the specified face features, if yes, the specified face features are converted into a second feature coding sequence, and the encrypted video data packet is decrypted based on a messy code decryption algorithm corresponding to the messy code filling algorithm and the second feature coding sequence to obtain the target video stream.
Storage medium-any of various types of memory devices or storage devices. The term "storage medium" is intended to include: mounting media such as CD-ROM, floppy disk, or tape devices; computer system memory or random access memory such as DRAM, DDR RAM, SRAM, EDO RAM, lanbas (Rambus) RAM, etc.; non-volatile memory such as flash memory, magnetic media (e.g., hard disk or optical storage); registers or other similar types of memory elements, etc. The storage medium may also include other types of memory or combinations thereof. In addition, the storage medium may be located in a first computer system in which the program is executed, or may be located in a different second computer system connected to the first computer system through a network (such as the internet). The second computer system may provide program instructions to the first computer for execution. The term "storage medium" may include two or more storage media residing in different locations, e.g., in different computer systems connected by a network. The storage medium may store program instructions (e.g., embodied as a computer program) that are executable by one or more processors.
Of course, the storage medium containing the computer-executable instructions provided in the embodiments of the present application is not limited to the data transmission method based on the secure cryptographic chip described above, and may also perform related operations in the data transmission method based on the secure cryptographic chip provided in any embodiment of the present application.
The data transmission device, the storage medium, and the electronic device based on the secure cryptographic chip provided in the above embodiments may execute the data transmission method based on the secure cryptographic chip provided in any embodiment of the present application, and reference may be made to the data transmission method based on the secure cryptographic chip provided in any embodiment of the present application without detailed technical details described in the above embodiments.
The foregoing is considered as illustrative of the preferred embodiments of the invention and the technical principles employed. The present application is not limited to the particular embodiments described herein, but is capable of various obvious changes, rearrangements and substitutions as will now become apparent to those skilled in the art without departing from the scope of the invention. Therefore, although the present application has been described in more detail with reference to the above embodiments, the present application is not limited to the above embodiments, and may include other equivalent embodiments without departing from the spirit of the present application, and the scope of the present application is determined by the scope of the claims.

Claims (7)

1. A data transmission method based on a secure encryption chip is characterized by comprising the following steps:
extracting a target video stream by a monitoring terminal, identifying each video frame of the target video stream based on a face detection algorithm, and judging whether the target video stream contains specified face features, wherein the specified face features are configured to the monitoring terminal in advance by a request terminal;
under the condition that the target video stream is determined to contain the specified human face features, processing the target video stream by using a set messy code filling algorithm based on a first feature coding sequence converted from the specified human face features, combining the first feature coding sequence and the coding sequence of the target video stream through a coding filling rule of the messy code filling algorithm to obtain an encrypted video data packet, and sending the encrypted video data packet to the corresponding request end;
the request end receives face information input by a user, judges whether the face information is matched with the specified face features, if so, converts the specified face features into a second feature coding sequence, and decrypts the encrypted video data packet based on a messy code decryption algorithm corresponding to the messy code filling algorithm and the second feature coding sequence to obtain the target video stream;
the encoding filling rule is multiple, and the merging of the first feature encoding sequence and the encoding sequence of the target video stream by the encoding filling rule of the scrambling code filling algorithm includes:
selecting a target filling rule from a plurality of the coding filling rules, and merging the first characteristic coding sequence and the coding sequence of the target video stream based on the target filling rule; or,
merging the first feature encoding sequence and the encoding sequence of the target video stream using a plurality of the encoding stuffing rules;
the merging the first feature encoding sequence and the encoding sequence of the target video stream using the plurality of encoding fill rules comprises:
configuring corresponding coding filling rules for the video frames corresponding to the time stamp sequence according to the time stamp sequence of each video frame in the target video stream; selecting a corresponding coding filling rule according to the time stamp sequence of the current video frame to combine the coding sequence of the current video frame and the first characteristic coding sequence; or,
based on the first characteristic coding sequence and the coding sequence of the target video stream, using a first coding filling rule to carry out messy code filling encryption to obtain encrypted data, and iteratively using different coding filling rules and the first characteristic coding sequence to carry out encryption on the basis of the encrypted data.
2. The data transmission method based on the secure encryption chip as claimed in claim 1, further comprising:
and the monitoring end periodically updates the coding filling rule, and after the coding filling rule is updated, an updating instruction is sent to the request end so that the request end updates the coding decryption rule of the messy code decryption algorithm according to the updating instruction.
3. The data transmission method based on the secure encryption chip as claimed in claim 1, wherein the identifying each video frame of the target video stream based on the face detection algorithm, and determining whether the target video stream contains a designated face feature, comprises:
inputting each video frame of the target video stream into a pre-constructed target detection model for detection, and judging whether the target video stream contains specified face features or not based on an output result of the target detection model, wherein the target detection model is trained and constructed in advance according to a training data set constructed by the specified face features.
4. The data transmission method based on the secure encryption chip as claimed in claim 3, further comprising, after determining that the target video stream contains the specified facial features:
and updating the target video stream to the training data set, and iteratively training the target detection model based on the updated training data set.
5. A data transmission device based on a secure encryption chip is characterized by comprising:
the identification module is used for extracting a target video stream through a monitoring end, identifying each video frame of the target video stream based on a face detection algorithm, and judging whether the target video stream contains specified face features, wherein the specified face features are configured to the monitoring end in advance by a request end;
the encryption module is used for processing the target video stream by using a set messy code filling algorithm based on a first feature coding sequence converted by the specified human face features under the condition that the target video stream is determined to contain the specified human face features, combining the first feature coding sequence and the coding sequence of the target video stream through a coding filling rule of the messy code filling algorithm to obtain an encrypted video data packet, and sending the encrypted video data packet to the corresponding request terminal;
the decryption module is used for receiving face information input by a user through the request terminal, judging whether the face information is matched with the specified face characteristics or not, if so, converting the specified face characteristics into a second characteristic coding sequence, and decrypting the encrypted video data packet based on a messy code decryption algorithm corresponding to the messy code filling algorithm and the second characteristic coding sequence to obtain the target video stream;
the encoding filling rule is multiple, and the encryption module is specifically configured to:
selecting a target filling rule from a plurality of the coding filling rules, and combining the first feature coding sequence and the coding sequence of the target video stream based on the target filling rule; or,
merging the first feature encoding sequence and the encoding sequence of the target video stream using a plurality of the encoding stuffing rules;
the merging the first feature encoding sequence and the encoding sequence of the target video stream using the plurality of encoding fill rules comprises:
configuring corresponding coding filling rules for the video frames corresponding to the time stamp sequence according to the time stamp sequence of each video frame in the target video stream; selecting a corresponding coding filling rule according to the time stamp sequence of the current video frame to combine the coding sequence of the current video frame and the first characteristic coding sequence; or,
based on the first characteristic coding sequence and the coding sequence of the target video stream, using a first coding filling rule to carry out messy code filling encryption to obtain encrypted data, and iteratively using different coding filling rules and the first characteristic coding sequence to carry out encryption on the basis of the encrypted data.
6. An electronic device, comprising:
a memory and one or more processors;
the memory for storing one or more programs;
when executed by the one or more processors, cause the one or more processors to implement the method for data transmission based on a secure cryptographic chip as claimed in any one of claims 1 to 4.
7. A storage medium containing computer-executable instructions for performing the secure cryptographic chip-based data transmission method of any one of claims 1 to 4 when executed by a computer processor.
CN202211023071.4A 2022-08-25 2022-08-25 Data transmission method and device based on security encryption chip Active CN115134080B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211023071.4A CN115134080B (en) 2022-08-25 2022-08-25 Data transmission method and device based on security encryption chip

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211023071.4A CN115134080B (en) 2022-08-25 2022-08-25 Data transmission method and device based on security encryption chip

Publications (2)

Publication Number Publication Date
CN115134080A CN115134080A (en) 2022-09-30
CN115134080B true CN115134080B (en) 2022-12-20

Family

ID=83387730

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211023071.4A Active CN115134080B (en) 2022-08-25 2022-08-25 Data transmission method and device based on security encryption chip

Country Status (1)

Country Link
CN (1) CN115134080B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115361239B (en) * 2022-10-20 2023-01-10 广州万协通信息技术有限公司 Driving storage data uploading method, device, equipment and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103152556A (en) * 2013-03-15 2013-06-12 云南大学 Surveillance video encryption method for protecting privacy
CN110620891A (en) * 2019-09-27 2019-12-27 上海依图网络科技有限公司 Imaging system and video processing method
CN114915805A (en) * 2022-07-18 2022-08-16 广州万协通信息技术有限公司 Video stream transmission method based on double encryption mechanism and security chip device
CN114938465A (en) * 2022-07-25 2022-08-23 广州万协通信息技术有限公司 Encrypted data transmission method and device based on characteristic sequence

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20130067530A (en) * 2011-12-14 2013-06-25 한국전자통신연구원 Apparatus and method for transmitting video surveillance, apparatus and method for receiving surveillance video thereof
CN108711208A (en) * 2018-05-21 2018-10-26 中兴智能视觉大数据技术(湖北)有限公司 A kind of big data access control system and its management method
US20210392116A1 (en) * 2018-10-02 2021-12-16 Ncs Pte. Ltd. Privacy Protection Camera
CN109615256A (en) * 2018-12-17 2019-04-12 武汉烽火信息集成技术有限公司 Wisdom garden security protection risk control method, storage medium, electronic equipment and system
FR3099016B1 (en) * 2019-07-18 2021-07-30 In Idt Method for generating a private key from biometric characteristics.
US11178123B2 (en) * 2019-09-26 2021-11-16 At&T Intellectual Property I, L.P. Video communication data security

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103152556A (en) * 2013-03-15 2013-06-12 云南大学 Surveillance video encryption method for protecting privacy
CN110620891A (en) * 2019-09-27 2019-12-27 上海依图网络科技有限公司 Imaging system and video processing method
CN114915805A (en) * 2022-07-18 2022-08-16 广州万协通信息技术有限公司 Video stream transmission method based on double encryption mechanism and security chip device
CN114938465A (en) * 2022-07-25 2022-08-23 广州万协通信息技术有限公司 Encrypted data transmission method and device based on characteristic sequence

Also Published As

Publication number Publication date
CN115134080A (en) 2022-09-30

Similar Documents

Publication Publication Date Title
CN109218825B (en) Video encryption system
CN114915805B (en) Video stream transmission method based on double encryption mechanism and security chip device
CN109151508B (en) Video encryption method
CN112949545B (en) Method, apparatus, computing device and medium for recognizing face image
CN105812366A (en) Server, anti-crawler system and anti-crawler verification method
CN111741268B (en) Video transmission method, device, server, equipment and medium
CA3184510A1 (en) Image distribution using composite re-encrypted images
CN110598390B (en) Verification code method, server and verification code system based on picture
CN115134080B (en) Data transmission method and device based on security encryption chip
KR101338341B1 (en) Cctv media secure transmission system and method thereof
CN114024744A (en) Information protection method and artificial intelligence platform based on cloud computing and block chain service
TWI820064B (en) Securing digital data transmission in a communication network
KR101331201B1 (en) Cctv media secure transmission system and method thereof
JP7236042B2 (en) Face Recognition Application Using Homomorphic Encryption
CN113918977A (en) User information transmission device based on Internet of things and big data analysis
CN115114667A (en) Privacy information processing and classifying method and device for security chip
CN107292133A (en) The obfuscation method and device of artificial intelligence
KR102038217B1 (en) Information security system through encrypting and decrypting personal data and contents in smart device based on Lightweight Encryption Algorithm, method thereof and computer recordable medium storing program to perform the method
CN115086718A (en) Video stream encryption method and device
CN115426189A (en) Information security protection method and system based on big data
CN112702623A (en) Video processing method, device, equipment and storage medium
CN113052044A (en) Method, apparatus, computing device, and medium for recognizing iris image
CN109788249B (en) Video monitoring control method based on industrial internet operating system
CN109120589B (en) Terminal information protection method and device based on encryption password
Choi et al. A distributed cloud based video storage system with privacy protection

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant